Figure 2From: Comparative study of digital audio steganography techniques Audio steganography workflow. Back to article page